Menu

Investigating Digitally Enabled Fraud

Investigating Digitally Enabled Fraud

Course content

The course modules are designed to improve the delegate’s ability to carry out investigations in today’s technological environment. The programme is practical in nature with delegates being able to access relevant sites and develop a greater understanding of the digital environment.

Module 1 Understand the digital landscape

Delegates will learn how the World Wide Web and the internet are made up, the makeup of IP addresses (both IPv4 and IPv6) and why it has to change. They will learn and demonstrate how to trace and identify IP addresses as well as how IP addresses are allocated to specific users.

Module 2 Understand digitally enabled fraud types

Delegates will see how all types of fraud now have the potential to have a cyber element to them. They will examine how offenders use cyber to commit crime and understand how victims and potential victims are targeted by the online offender with attacks such as phishing and password attacks. This includes techniques to prevent becoming a victim of a phishing attack to creating hyper secure passwords.

Module 3 Explain how fraudsters use digital platforms

Delegates will learn the differences between the surface/ deep and dark web. They will have the opportunity to see dark net sites and how fraudsters and criminals run illegal activities online via the TOR browser

Delegates will see how and why criminals and law enforcement can become anonymous online and access simple tools for safe browsing.

Module 4 Understanding crypto currencies

This module looks at the relatively new concept of crypto currencies. It explains the history and theory behind Bitcoin (amongst many others) and how this is becoming a massive tool for online financial transactions both legal and illegal. This module will show investigators how they can trace transactions and see all currency movements between users online.

Module 5 How to manage a digital crime scene

This module explains the four principles of digital crime scene management. It explains the legal framework relating to the recovery of digital platforms and seizure protocols for:

• Mobiles.

• Tablets.

• Laptops.

• Desktops.

Module 6 The investigative opportunities in the digital environment

Delegates will learn about the police protocol for requesting a web takedown of a UK based website. A practical based lesson on open source searching will teach delegates about many search tools and skills that are available to them to carry out deep web searches.

Module 7 Describe how to develop a digital media strategy in fraud investigations

This module aims to explain the requirement for digital and social media strategies in investigations.

Course outcomes

On completion of the course, delegates will:

Understand digitally enabled fraud types.

Explain how fraudsters use digital platforms.

Demonstrate how to manage a digital crime scene.

Describe the investigative opportunities in the digital environment.

Describe how to develop a digital media strategy in fraud investigations.